Friday, July 26, 2013

The dangers of Wi-Fi on vacation - BIT Magazine, Computer for all.

dangers of Wi-Fi on vacation

Posted on July 26, 2013, Friday – 15:42

airports, cafes and hotels usually have points or hotspots Wi-Fi, however, in most cases, the data are not encrypted, which means that anyone can intercept those with malicious purposes.

According to Kaspersky Lab, we must always take into account the amount of information sent and received through this kind of public networks, especially if personal data like passwords, usernames or financial information.

So what will be the best alternative for accessing the internet on holiday? The best option is to use a VPN (Virtual Private Network), although many administrators utilities blocking this access to prevent your network is not used with malicious purposes.
And if the VPN is blocked, what to do? In some cases, an SSL link level protocol or secure connection can help. It is therefore necessary to type https:// in the address bar, followed by the domain name, before visiting any web page. When the page loads, we prove that the certificate used for encryption is valid and directs us to website authentic. You can also use an Ethernet cable instead of a WiFi connection
security solutions such as Kaspersky Mobile Security and Kaspersky Tablet Security, are another alternative, protecting your devices, so you have a secure browsing, wherever you are.

Written by RA

Google prepares platform for distance learning - Digital Journal

Google prepares learning platform distância

Google is preparing its entry into the education sector with the launch of a platform through which anyone can offer courses on anything and still choose to charge for it.

Helpouts works seamlessly to video services company, Hangouts and YouTube, in addition to using Google calendar, since classes may be scheduled in advance. If the teacher wishes to charge for classes, will have access to Google Wallet to it.

According to TechCrunch, the product has entered the testing phase in late June, but should be released only in a month.

There will be a number of categories of learning, such as computing, education, food, health, repair, etc.. And Google has already signed several partnerships with organizations that will lead to professional lessons Helpouts. All offers have to choose between free or paid.

Another feature is that the service can be used to connect consumers and retailers or manufacturers. So if you buy a computer and need help with the configuration, the client will have a communication path directly on video to ask questions.

  • Print
  • Email
  • Share

Comments

All comments are subject to moderation. DD reserves the right to delete comments that do not comply with the rules of use. The comments are the sole responsibility of their authors.

Video: University of Aveiro and Efacec present in satellite ... - EN Official

Device has components manufactured in Portugal and was launched by the European Space Agency (ESA) this Thursday. Technologies of the two Portuguese organizations have similar missions.

Alphasat satellite was successfully launched on Thursday from Kourou base coupled to the Ariane 5 rocket in French Guiana, were about 20h00 in Portugal.

Aboard the device takes technology made in Portugal.

Aveiro University developed a board with gallium nitride transistors. The purpose of the ESA is to verify that over time these same transistors suffer power variations.

Failure to do so in the future may be used to replace parts that take up more space and require more energy for their operation. Result? Costs decrease, then the price of telecommunications can also be significantly lower.

Who

also present in Alphasat is Efacec. The Portuguese giant intends to test in space solar exposure to various electronic components.

Alphasat satellite was developed by Astrium, a subsidiary of the European Aeronautic Defence and Space Company, and the entire project involved an investment of about three million.


v1.3 Download SocComments

Camino de Santiago de Compostela in Alentejo will become ... - Southern Region

Diocese of Beja and humanitarian organization Order of Malta will collaborate to make the Camino de Santiago de Compostela in Alentejo “accessible to all” and support the pilgrims, which have increased “substantially.”

Through an agreement “innovative” with the motto “Making accessible the Camino de Santiago to all”, the two institutions will “create conditions on the ground for the guidance and reception of pilgrims,” ??which have risen “substantially in recent years,” explains Department of Historical and Artistic Heritage of the Diocese of Beja (DPHADB), in a statement sent to Lusa.

According to DPHADB, the Sovereign Military Order of the Hospital of St. John of Rhodes and of Malta, known as Order of Malta, performs “remarkable work in the service of pilgrims” of the Camino de Santiago, an “experience that aims to extend the new territories of Alentejo” through the agreement.

The agreement, which also provides appreciation of the spiritual and material heritage of the Order of Malta, which “took on a very important presence in the Alentejo”, will be signed on Thursday in a ceremony from 19:30 in the parish church of Santiago do, indicates DPHADB.

The Camino de Santiago, designation of the various routes used by pilgrims who follow toward the cathedral of Santiago de Compostela, in the Spanish region of Galicia, dating back to the ninth century and through the whole of Europe, “from the ends Russia and Scandinavia to the Mediterranean and the shores of the British Isles, “explains DPHADB.

The road was classified as the first European Cultural Route by the Council of Europe in 1987, and some years later, UNESCO awarded him the status of a World Cultural Heritage, first in Spain (1993) and then in France (1997), “something that is intended to extend to other European countries,” the DPHADB.

Portugal is a “privileged segment” of the “vast cultural network” Camino de Santiago, which is “present throughout almost all of mainland”, says the DPHADB, that during the last decade, has developed “an intense work of rediscovery” of the route in the Alentejo.

The work, which has been directed by the DPHADB, José António Falcão, and count on the participation of experts from universities and museums Portuguese French, Irish, Spanish and German, is producing “significant fruit, allowing to bring to light monuments, works of art and archival documents long forgotten.”

Defined scientific work, it is necessary to create conditions for the guidance and reception of pilgrims, says the DPHADB, explaining that, in this sense, has been dialogue with institutions that can provide support to those who follow on foot, bike or horse to Galicia, but also to other shrines, as Our Lady of Fatima or Aires (Viana do Alentejo).

The cooperation involves municipalities, parishes, associations, fire departments, fraternities and Holy Houses of Mercy, the need DPHADB, stating that “the time has come of the Diocese of Beja unite their efforts with those of other age-old institution “, the Order of Malta.

Thursday, July 25, 2013

Portuguese satellite will be launched today in space - TVI24

telecommunications satellite “Alphasat ‘with part of the’ hardware ‘developed by Portuguese company Efacec will be launched this Thursday in space by the European Space Agency (ESA), the company said in a statement sent to Lusa.

The new release will put the satellite “Alphasat» in geostationary orbit, ie an orbit the equatorial plane land conducive to the location of communications satellites, as their orbital periods are equal to the rotation period of the Earth ( 23 hours, 56 minutes and 4.09 sec), known as the sidereal day.

The technology integrated on the satellite consists of a radiation monitor that measures the energy of electrons and protons emitted by the sun, and a system notes that the effect of space radiation on various devices.

The launch of Alphasat, with place on the basis of ESA Kourou (French Guiana), will begin around 19:50, an hour from Lisbon, and may be followed directly on the websites of the ESA and Arianespace.

Efacec "launched" into space - Business Journal - Portugal

Efacec has technology built in SATA © lite Alphasat that à © Releases § ado, French Guiana, this Thursday, July 25, at the end of the day.

Efacec is present in Alphasat, the communications satellite that will be this Thursday, July 25, launched in space. The project involved a value of three million euros.

According to the company explains what is installed by Efacec in Alphasat are CTTB and MFS. The first is designed to test electronic components. To that includes a core with a letter of supply, processing a letter, a letter of power distribution and three letters of experiences.

MFS is an electronic device that allows you to detect the impact of protons, electrons, alpha particles and other ions, recognize them and measure their energy creating histograms, explains Efacec.

The launch is expected to happen in a window between 20h53 (Lisbon time) and 22h11. The Alphasat will be launched from French Guiana. ESA (European Space Agency) Alphasat describes as “the largest and most sophisticated satellite telecommunications European.”

Alphasat was built by Astrium (EADS) in partnership with the European Space Agency and the British Inmarsat. The launch can be followed on the Internet here.

According to a communication from Efacec, this is not the first entry of the company into orbit. In February 2008, the International Space Station received EuTemp, who worked on VACULO for 18 months and has returned to earth.

Portuguese company is still developing the radiation monitor for BepiBolombo mission, which plans to launch in 2016 a space probe that will orbit the planet Mercury.

"Real Baby" is already computer virus - TVI24

Writing Lux at 2013-07-25 18:42

hackers created a virus from the actual birth of the baby.

Seizing the curiosity of internet users, hackers invented malicious software that supposedly allowed access to the room where video Kate was with child.

However, the virus spread to the baby photos, searchable in search engines.

Kaspersky Lab, a company that creates antivirus detected one sending spam with the subject ‘real baby’ says the site “technewsdaily.com.”

By clicking on the link provided by hackers, computer installs a virus and is infected. The software name is “Troyan Downloader.js.expack.aie.”

This text was written under the new Orthographic Agreement

comment on this article

seja our fan on facebook
siga-nos in twitter

Big data, big brother and Snowden - Público.pt

information was a privileged knowledge and political power, economic and military since the dawn of civilization. With the development of information technology and computing and the widespread use of the Internet, the increasing flows of information have changed the way the economy works, finance, governance and social relations, creating new lifestyles.

We are now witnessing a new and profound transformation based on the phenomenon of big data , that is, the steep increase in the number and diversity of digitized data that circulate, are treated , analyzed and used for various purposes on a global scale.

It is estimated that at the beginning of this century, only about 25% of the information stored in the world was in digital form and the rest preserved on paper, photography, film and other media. Currently, spent little more than a decade, this percentage rose to over 90%.

All this information can now move easily in telecommunications networks. According to IBM, are created every day in the world about 2.5 exabytes of information, ie, 2.5 x 10 18 units of digital information or bytes . To gain a more concrete character of a text scanned and stored on a computer corresponds to a byte , the complete works of Shakespeare correspond to about 5 megabytes (5 x 10 6 bytes ) and the complete works of Beethoven about 20 gigabytes (20 x 10 9 bytes ).

big data evolves through growth of data volume, the increased flow of acquisition and processing speed and increasing variety of types and data sources and their acquisition technologies. Databases grow in many fields, environmental science, medicine, sociology, transport, economy, civil security and military and intelligence systems, due to the increasing use of sensor networks on land and in space, aboard satellites, radio identifiers, other systems of detection and recording of data and the proliferation and growing use of social networks.

parallel, it became possible to use these gigantic databases for various purposes due to the continuous increase in computer memory, processors getting faster, the software and more intelligent algorithms evolved. This combination of increased ease of detection of huge amounts of data and its storage, processing and analysis created the phenomenon of big data .

big data is to profoundly change the way we use information through three distinct modes. In the past, to make a statistical study of a system with a large number of elements, sought to construct a sample that was representative. Now, the main objective is to obtain data on the entire system. Became feasible to store, process and analyze all that data, which lets you explore and learn about the characteristics and behaviors of the subsystems.

Second, in the past, there was great concern that the data were all very reliable, it is now possible to deal with the uncertainty that results from some data does not have the desired quality.

Third, the use of big data enables us to discover a multitude of correlations between the data concerning all that helps us know how the system works, even if it is unknown why this operation. In a strictly operational matters much more aware of the existence of a correlation than discovering its cause.

big data is allowed to make remarkable advances in science, for example, in astrophysics, where the rapidly growing volume of data bases of observations on ground-based telescopes or space, in which they seek to discover signals very rare, but very relevant. This is the case of the demand for extra-solar planetary systems with planets similar to Earth, ie, with the possibility of habitable by complex shapes and even intelligent life.

Another example is

genomics, where big data reduces the duration of the process of deciphering the DNA sequencing of a living organism. In the case of the human genome program, initiated in 1990, the first sequencing took about ten years, but can now be held in less than a week.

use and statistical analysis of large databases of social networks and large multinational companies are processes that have growing importance and value of a social, political and economic.

Finally with regard to governance, the governments of the most powerful countries, including USA, Canada, Britain, Australia, China, Russia, Germany and France, quickly realized the enormous potential power of Big Data . On March 29, 2012, the U.S. government launched the Big Data Research and Development Initiative, endowed with an initial budget of 200 million dollars, with the aim of accelerating the pace of development of science and technology, to strengthen national security and transform the process of teaching and learning.

The program involves six ministries and also funds universities to promote the development of advanced training and research in big data applied to many different fields, from health to the environment, climate and economy. To take advantage of big data are required powerful computers in terms of processing speed and memory. According to the TOP500 project, the ten most powerful computers in the world in June 2013, five are American, two Chinese, two Germans and Japanese, the first being occupied by the Tianhe-2, a computer’s National Supercomputer Center in Guangzhou.

Before the initiative in March 2012, the U.S. Government has used the big data for espionage activities on a global scale, but clandestinely. The PRISM project, conducted by the National Security Agency (NSA), since 2007 worked in secret until the moment the Guardian and The Washington Post revealed its activities in six June 2013 based on statements made by Edward Snowden, a former analyst hired by the NSA who left the U.S., took refuge in Hong Kong and now hopes to obtain political asylum in Russia.

Although there are strong suspicions about the extent and depth of electronic espionage conducted by the Americans, the revelations of Snowden fell like a bomb in the world, especially in U.S. government circles. PRISM is able to register the contents of all forms of electronic communication worldwide, including all emails , all mobile phone calls, all voyages made on the Internet, all images and data on satellites, as well as all kinds of personal data, corporate, institutional and government that are in digital form and circulate in telecommunications networks.

We have several “ big brothers” spying and record continuously our lives without any legal basis, the U.S. is currently the biggest one. Big data has favored greatly the activities of the “big brother . In the U.S., these activities are done with fraquíssimo legal control of the Foreign Intelligence Surveillance Court, which is independent of the judiciary. The justification has been given for the secrecy and lack of strong legal controls is security, particularly the fight against terrorism. But the revelations of Snowden showed that this is false. There is evidence that the U.S. secretly watched about 38 embassies, many of them allies as well as various EU institutions.

The truth is that what the U.S. are primarily seeking economic information and financial support that may favor their companies and banks. Companies like Airbus and Thomson-CSF lost major contracts in favor of U.S. companies after they have been recognized by the U.S. peeps.

The ferocity with which the U.S. government wants to capture Snowden to condemn and silence forever and reveals the importance of the espionage activities based e big data have for the country to ensure its supremacy economic and military worldwide. Big data is a crucial means of the “big brothers maintain their hegemonic economic, financial and military in a world increasingly dominated by greed and in which natural resources begin to dwindle.

Nvidia introduces its next-generation technology for ... - Eurogamer.pt

Based on the new GPU “Project Logan.”

Nvidia presented at SIGGRAPH 2013 to its next-generation technology for mobile devices, displaying two tech demos.

demos were running on Unreal Engine 4 from Epic Games and GPU “Logan Project” Nvidia, which is based on the Kepler architecture, the same architecture used by printers latest PC.

Besides consuming less than one-third of the energy consumed of GPUs used in tablets dominating the market, the Logan graphical specification supports all of OpenGL 4.4, DirectX 11 API and the latest Microsoft.

can read more about Logan blog Nvidia.

Mad Hatter is more a villain confirmed for Batman: Arkham ... - Net & Tech

Batman: Arkham Origins will bring some famous villains of the universe man-bat that will unite to put an end once and for all with Batman during Christmas Eve.

MadHatterAC

game it will be before the other two titles in the franchise (Arkham Asylum and Arkham City) and not even being developed by Rocksteady, promises to bring all the elements that consecrated the series as one of the best adaptations of superhero comics for .

new villain is revealed Mad Hatter or Mad Hatter , which according to the producer, will play an important role this time, since the character had made a contribution in Arkham City.

The launch is scheduled for October 25 in Xbox 360, PS3, Wii U and PC , as well as a portable version Nintendo 3DS and Playstation Vita .

Wednesday, July 24, 2013

Baby real "launches" new virus on the Net - News Journal (blog)

Rating

results

Next Day

30 Day

Benfica – Moreirense (3-1)

V. Guimarães – Rio Ave (0-1)

Olhanense – Martimo (0-0)

Beira-Mar – Sporting (1-4)

Moreirense – P. Ferreira (0-5)

Sporting – V. Guimarães (1-1)

Gil Vicente – Estoril (1-3)

P. Ferreira – FC Porto (0-2)

30 Day

Benfica – Moreirense (3-1)

V. Guimarães – Rio Ave (0-1)

Olhanense – Martimo (0-0)

Beira-Mar – Sporting (1-4)

Moreirense – P. Ferreira (0-5)

Sporting – V. Guimarães (1-1)

Gil Vicente – Estoril (1-3)

P. Ferreira – FC Porto (0-2)


1 – FC Porto (78)

2 – Benfica (77)

3 – P. Ferreira (54)

4 – Braga (52)

5 – Estoril (45)

6 – Rio Ave (42)

7 – Sporting (42)

8 – National (40)

9 – V. Guimarães (40)

10 – Martimo (38)

11 – Acadmica (28)

12 – V. Setbal (26)

13 – Gil Vicente (25)

14 – Olhanense (25)

15 – Moreirense (24)

16 – Beira-Mar (23)

Earth photographed from Saturn - News Journal (blog)

Rating

results

Next Day

30 Day

Benfica – Moreirense (3-1)

V. Guimarães – Rio Ave (0-1)

Olhanense – Martimo (0-0)

Beira-Mar – Sporting (1-4)

Moreirense – P. Ferreira (0-5)

Sporting – V. Guimarães (1-1)

Gil Vicente – Estoril (1-3)

P. Ferreira – FC Porto (0-2)

30 Day

Benfica – Moreirense (3-1)

V. Guimarães – Rio Ave (0-1)

Olhanense – Martimo (0-0)

Beira-Mar – Sporting (1-4)

Moreirense – P. Ferreira (0-5)

Sporting – V. Guimarães (1-1)

Gil Vicente – Estoril (1-3)

P. Ferreira – FC Porto (0-2)


1 – FC Porto (78)

2 – Benfica (77)

3 – P. Ferreira (54)

4 – Braga (52)

5 – Estoril (45)

6 – Rio Ave (42)

7 – Sporting (42)

8 – National (40)

9 – V. Guimarães (40)

10 – Martimo (38)

11 – Acadmica (28)

12 – V. Setbal (26)

13 – Gil Vicente (25)

14 – Olhanense (25)

15 – Moreirense (24)

16 – Beira-Mar (23)

Teachers flunk the test that will assess their capabilities - Público.pt

Contracted teachers flunk, for now, the proposals of the Ministry of Education and Science (MEC) on the new Evidence Assessment of Knowledge, Skills and Abilities. The National Association of Teachers Engaged do know that “makes no sense”, first, that only someone who is not part of the frame is subject to this review. “Many teachers hired have more years of service than many who are on the board.”

Paulo César Israel, the association says more: the ministry’s proposal to introduce this kind of examination means “to pass a clean bill of ignorance” to higher education institutions that form teachers. “The MEC has not made an assessment of the quality of teacher training and what sense does a teacher who leaves the university to be shortly after, doing exams again to teach?”

He continues, when we know that in the last competition of only three teachers for 45 000 candidates were able to place the picture, why talking about a test that limits access to career. “What career?”

proposed rulemaking proof sent by MEC unions, on Tuesday, along with other legislation on continuing training should be negotiated on Friday. “It’s an element to distract teachers than there is” suspected Israeli Paulo. “It is customary in July and August, when teachers are on vacation, take advantage to publish important legislation.”

complex and contentious matters
The National Association of Teachers Engaged is not the only one to react badly to what is suggested by the guardianship. The National Federation of Teachers (Fenprof) issued a brief statement this morning that says that “the current ministerial team does not deserve any credibility and political bargaining.” Furthermore, “the MEC should not mark negotiating matters as complex and contentious as these to full vacation of teachers.”

For these reasons, the Fenprof says on Friday will be limited to “a technical representation” in MEC, “removing thus the political character that was supposed to have this meeting.”

The National Federation of Education (FNE) is also against the Government’s proposal. “The FNE maintains a complete opposition to the holding of a trial after the initial training of teachers made in higher education institutions that recognize their diploma through that person gathers knowledge and skills to be able to be a teacher,” he told Lusa João Dias da Silva , general secretary of the federation.

Evidence Assessment of Knowledge, Skills and Competencies is planned since 2007, but never materialized. And should be held by all teachers casuals who want to teach.

According to the proposed legislation by the MEC, have a common written, which aims, among others, to assess the candidates’ ability to “solve problems in areas not disciplinary.” The MEC is proposed that this part of the test has a maximum duration of 120 minutes. Who is not approved can not proceed to the second phase.

And the second phase is what MEC calls “the particular” this examination. It consists of “a proof that can be written, oral or practical.” It will run between 120 and 180 minutes, according to the disciplinary groups. Its contents vary: a professor of biology, for example, will give a proof of that area, a Technology Education will be subject to assessment in Visual Arts, or Computer or Electrical Engineering.

Weighted different components, teachers who want to teach will have to get at least 14 on a scale of zero to 20, in order to teach.

Cisco Systems agrees to buy Sourcefire for 2.7 billion dollars - Business Journal - Portugal

largest maker of networking technology in the world continues to invest in buying companies and ther acquire Sourcefire, a company that develops technology for Internet security § a.

Cisco Systems has agreed to the purchase of Sourcefire, a company that develops technology for Internet security, for 2.7 billion dollars, the company said in a statement quoted by Bloomberg. The amount corresponds to 76 cents per share, ie 29% more than the closing stock market trading at its meeting on Monday.

With this acquisition, Cisco will compete with some security vendors smaller as the Palo Alto Networks and Fortinet. Revenues from technology led by John Chambers will benefit from this agreement, as well as the credibility of the company, said Jason Ader, an analyst at William Blair & Co. told Bloomberg News.

In the United States of America, Cisco lost 0.27% to $ 25.65 per share, after this announcement. Already Sourcefire, to negotiate in the same country, totaled 27.84% to 75.53 cents.

How many tweets worth an heir to the crown? - Público.pt

The story of William and Kate looks like a fairy tale. The classic tale of the commoner who knows the royal person always ends with a wedding and the birth of a descendant. And the British case was no exception. The future King of England came into the world on Monday at around 16h24 in St. Mary’s Hospital, London, with 3.9 pounds.

reactions on Twitter are varied, with several demonstrations and wishes for a prosperous and happy life … but there are those who decide to do a little humor to the situation, resorting to sarcasm and irony to describe the birth Baby Kate and William. According to AFP, the references to the royal heir corresponded to 25,300 tweets a minute after birth. The hashtag # royal bab y was used 900,000 times, and continues to increase.

In

network Twitter, the information was mentioned more than two million times and peak conversation was recorded at around 20h37, a few minutes after the birth of the baby, with more than 25,300 tweets per minute.

This number is far from 132 000 tweets per minute when Francisco was elected Pope. Even more impressive, the re-election of the first U.S. President african-american, Barack Obama, reached 237 thousand tweets per minute.

still do not know the name of the child, who is third in line of succession to the British throne. In Europe there are other houses with real estate still small, as is the case in Swedish, in which Princess Estelle, born January 23, 2012, is the second in order of succession to the throne after his mother, Princess Victoria. The law that prevented women from being queen was abolished in 1980 in Sweden.

In 2005 born the heirs of Denmark and Spain. Prince Cristian, born October 15, is the second in order of monarchical succession after his father, Prince Frederik, the eldest son of Queen Margrethe II of Denmark. In Spain, the Infanta Leonor de Borbón, born on 31 October 2005, is in second place for the succession of King Juan Carlos, after his father, Prince Philip. Maintain this position, if not will have no brother.

Born on January 21, 2004, Ingrid Alexandra is the first daughter of Crown Prince Haakon Magnus and succeed the father at the helm of Norway. Princess Catharina-Amalia, born December 7, 2003, is the first daughter of King Willem-Alexander and Maxima of the queen, and will be the future queen of the Netherlands.

Tuesday, July 23, 2013

Million SIM cards vulnerable to 'hackers' - TVI24

A failure on SIM cards may jeopardize spy million carriers of these devices, according to an expert on advances segurança.O German Karsten Nohl found a way to get the codes of SIM cards by sending a text message to the phone.

Messages sent to personal phones can be disguised as messages from telephone companies with a digital signature. By accessing the message, allows the “hacker” virus insert the card.

The hacker may also have access to the contents of the phone, how to send messages and listen to calls. In the case of people associated with the bank card, can be made illegal transfers.

“In Europe, we use sim cards to make calls and send messages, but many people in Africa use them to control the bank accounts the phone, “said Nohl told the BBC.

The GSMA, a worldwide organization that represents the mobile communications industry, is examining the findings. “The discovery of Karsten gave us the opportunity to do a preliminary analysis,” said the spokesman of the organization.

Billing Apple beats Wall Street numbers and stocks go up ... - Techworld

The company had revenues of $ 35.3 billion in the fiscal third quarter, above the forecast of investors. We sold 31.2 million iPhones

src=”http://idgnow.uol.com.br/idgimages/applef_435.jpg”

Apple just released the results of its fiscal third quarter advertising revenue of 35.3 billion dollars. The number exceeds the forecast of Wall Street analysts, who expected 35., 02 billion and made the company’s shares jump 4%.

hit record sales of iPhones in the quarter, totaling 31.2 million handsets, compared with 26 million iPhones sold in the same period last year. However, sales of iPad and Macs were lower than the same period in 2012. Were sold 14.6 million iPads, up from 17 million in 2012 and 3.8 million Macs, up from 4 million computers in the same period last year.

The company’s net profit was 6.9 billion, or $ 7.47 per share. In the same period the previous year the company had revenues of $ 35 billion and net income of 8.8 billion, or $ 9.32 per share. International sales accounted for 57% of total company revenues in the quarter. Gross margin was 36.9% in 2013 from 42.8% in 2012, the same period.

Board Apple declared dividend payment of $ 3.05 per share in cash, the sererm paid until August 15, 2013. “We generated $ 7.8 billion in cash on operations during the quarter and we are pleased to return $ 18.8 billion in cash to our shareholders in the form of dividends and share buybacks,” said Peter Oppenheimer, Apple’s CFO .

“We are especially proud of our record quarter with iPhone sales and strong growth in revenues from iTunes, Software and Services,” said Tim Cook, Apple’s CEO. In the official statement, Tim Cook celebrates the arrival of iOS7 and OS X Mavericks, both for the second half of 2013 and warns that the company is “fully focused and working hard to sensational products that will launch later this year and throughout 2014.”

The company has a conference call with analysts beginning at that time. To listen to the live conference between the address www.apple.com/quicktime/qtv/earningsq313.

SIM cards can be vulnerable to hacking - Techworld

million phones may be at risk due to the use of a coding pattern 70

Millions of phones may be vulnerable to eavesdropping due to the use of encryption obsolete, the 70, according to a study to be presented at the Black Hat Security Conference, which takes place on 31 July in Las Vegas.

expert in cryptography Security Research Labs, Karsten Nohl found a way around the safety of mobile phones and have access to the location of the device and the SMS functions, and allows changes in the number of voicemail.

Nohl’s research was based on the SIM card of the mobile phone, which when connected to a phone number authenticate software upgrades and the commands sent by the operator.

There are over 7 billion SIM cards in operation. To ensure privacy and security, SIM cards use encryption when communicating with the operator, but the encryption standards vary enormously.

Nohl’s research found that many SIMs use an encryption standard that dates back to the ’70s, called DES (Data Encryption Standard). The DES has been considered as a form weak encryption, and many traders have evolved safest forms of encryption. It is relatively easy to discover the private key used to sign the content encrypted with DES. The specialist Resear Security Labs did it in two minutes with a simple computer.

private DES key in hand, you can “subscribe” to updates malware with it and send to the device. The device identifies as sent by a legitimate source and allows access to sensitive data.

Using the private key

YES, an attacker can force the SIM card to load Java applets, which are essentially small programs that perform some function. These applets can send SMS, voicemail or change the location of the call, including predefined functions. “These features provide only a huge potential for abuse,” according to the company.

One of the possible solutions to the problem would be the use of SIM cards with high-level encryption and the use of Java virtual machines that restrict access to certain applets.

NASA reveals new images of the "pale blue dot" (Earth) seen ... - Público.pt

Cassini spacecraft currently orbiting Saturn, turned a few days ago its highest resolution camera in our direction and picked up color images of the Earth and Moon, announced on Tuesday the U.S. space agency NASA in a statement.

The probe is a joint project of NASA, the European Space Agency (ESA) and the Italian Space Agency.

The photographs, which were taken at 1500 million kilometers away from us, are the first Cassini who can show our planet and its natural satellite as two separate objects, NASA explains.

images now published (the first of several that accompany this text) had to be enlarged five times, the brightness of both the Earth and the Moon increased – and the brightness of the Moon further increased relative to the Earth to the Moon be visible. The picture shows our “pale blue dot” and his single “companion” immersed in the vast darkness of space.

For its part, the Messenger spacecraft, designed and built by the Johns Hopkins University (USA) in orbit around Mercury, captured an image to black and white to 98 million kilometers away from us.

is the third time that the Earth appears in the view of the outer solar system. The first spacecraft to “look back”, the February 14, 1990, was NASA’s Voyager 1, which at the time stood at more than six billion kilometers from Earth, beyond Pluto, the way the rest of the universe. The idea of ??turning the cameras that probe the Earth was the famous American astronomer Carl Sagan – and gave rise to the mythical image that earned our planet nicknamed “pale blue dot”, also written by Sagan.

Vulnerability German discovers serious flaw in the cards ... - News to the Minute

After three years of research and testing over a thousand SIM cards, an investigator German Security Research Labs discovered a flaw that allows pirating responsible for communications chips for mobile phones. After so many years of immunity, after all it is possible to remove these information cards in just two minutes.

German researcher Karsten Nohl discovered a problem in cryptography chips present in the SIM card, which allows you to copy or redirect existing data on the cards.

According to Mashable, this vulnerability discovery now allows pirating chips based on the old encryption standard called DES (Digital Encryption Standard), and Exame said that one in four SIMCard have this problem.

Although Karsten Nohl believe that nobody has explored and taken advantage of this problem, the researcher admits that the cloning process information is relatively simple, quick and easy, taking “two minutes.”

When you receive an SMS

invisible passes the phone to be controlled remotely, allowing the sending of messages to multiple numbers, call recording and redirection links, without the card owner being aware of it.

Nohl estimates that the number of cards affected with this problem is around 750 million.

The GSM Association, card manufacturers and telecom operators are already aware of the issue and volunteered to solve the problem ASAP.

Images revealed the new Nexus 7 and Moto X - TeK.sapo

Google has scheduled an event for next Wednesday, July 24, with the Head of the Android and Chrome OS, Sundar Pichai. A little more than 48 hours of the event does not seem to be any doubt about what will be presented: a new version of the tablet Nexus 7 and the first smartphone from Motorola a la Google .

A Posted @ evleaks had access to the alleged press images of the new Nexus and Moto X 7, and in both cases other reports already anticipated and leaked images reinforce the veracity of the images.

The renewed version of the tablet will evolve into a screen resolution of Full HD, will win a photo sensor rear five megapixel, will reportedly miss the back dotted roughness of the original model and it could have a notification LED on the lower front.

Nexus 7

According to information revealed to Engadget, the processor will be quad-core 1.5 Ghz – a slight improvement on the original Nexus 7 – and the engine will be two different versions: the 16GB will cost $ 229 and the 32GB will cost $ 269. The device will also support wireless shipments.

In the case of Moto X specifications are theoretically lower and point to a mid-range phone that can fight primarily by price-quality ratio and the levels of customization promises to be one of the facades of the equipment.

screen of 4.7 inches with a resolution of 1184×720 pixels, Snaprdragon S4 processor dual-core 1.7 Ghz, 2GB RAM, 16GB of internal storage and photo sensor 10.5 megapixel rear are some of the elements that constitute the Moto X.

Moto X

Support for LTE, NFC and software with unique features such as voice recognition always active are other features that can be revealed next Wednesday.

But the theme of the event Sundar Pichai must be version 4.3 of Android. Keeping the name Jelly Bean, the mobile operating system from Google is still a maturation process where minor updates are introduced.

This way Google complete what for many was missing in the edition of the Google I / O this year: new version of Android devices and new own brand.

Written under the new Orthographic Agreement

Monday, July 22, 2013

Apple tests iPad with screen 13 inches and larger iPhone ... - TeK.sapo

Apple is reportedly testing a larger version of the iPad and also has versions in testing iPhone with screens greater than four inches smartphone that currently has. The experiments are a way to analyze the performance and size of new formats for devices, but nothing guarantees that reach the market.

The information is advanced by The Wall Street Journal citing sources close to the production chains working with Apple. How to remember the American newspaper, this information does not guarantee that these prototypes come to be mass-produced as the testing of new equipment with manufacturing partners is a routine of the Cupertino company.

Recently Apple broke some “dogmas” of the company to introduce an iPhone more than the original version and an iPad 7.9 inch, forced by growing competition and the evolution of the mobile segment. The iPod Touch has also undergone a renovation and was the first iOS device to be distributed in different colors, in addition to the traditional black and white.

Currently, manufacturers like Samsung, Sony, HTC and LG are creating a wide range of devices and sizes, with the current standard of high-end smartphones based on the five-inch screen with a resolution of Full HD. The technology also have larger versions, like the Galaxy Mega, Ultra Z Xperia and LG Maximo Pro G, with screens ranging between 5.5 and 6.4 inches.

In the segment of tablets, the major technological solutions have also shown convertible screen sizes similar to portable computers and, in some cases, these tablets have up to more than 20 inches and a model function All-in-One with basic two operating systems.

The strategy of having a wide range of devices has resulted to that Samsung has managed to become the largest seller of smartphones worldwide. Apple still dominates the tablet market, but it has lost market share quarter after quarter.

Written under the new Orthographic Agreement

Relationship with Dracula and 9 more facts about real baby - Daily News - Lisbon

xmlns=”http://www.w3.org/1999/xhtml”>

Redirect Notice

The previous page is sending you to

http://www.dn.pt/inicio/globo/interior.aspx?content_id=3335968

.

If you not want to visit the que page, you can return to the previous page.

You can hack some SIM cards in just two minutes, says ... - IOnline

A researcher has discovered a vulnerability that allows, by sending some SMS, gain access to the SIM card of a user in order to listen to calls, send messages and steal data

Neither the SIM card, one of the key elements that allow us to use the services of a telecom operator a mobile phone, is immune to potential computer threats. According to Karsten Nohl of Security Research Labs, some SIM cards are vulnerable to a security flaw that allows itself to be exploited by some simple text messages.

To camouflage a SMS in order to make it appears to have been sent by a telecom operator, Nohl says that – in a quarter of cases – is received back an error message with the information necessary to access the digital switch SIM card. Access to this information, in turn, enables the sending of an SMS that opens up the card in order to listen to calls, send messages, make purchases via the phone or steal data.

This process does not take more than “two minutes and uses a simple personal computer”, although only affecting SIM cards availing the old standard for encrypted data (DES). It should be noted that the other three quarters of SIM cards that use the old DES system recognize the initial message as fraudulent, while SIM cards covered by the new standard Triple DES are unaffected.

There are not yet a concrete number for SIM cards that are affected by this vulnerability, but Nohl moves an estimated 750 million. SIM card manufacturers, telecom operators and even the GSM Association are already well informed about this vulnerability.

telemoveis.com *

Comic Con 2013 | Trailer 4. Season of 'The Walking Dead' - tvPRIME

walking-dead-season-3-banner

AMC has released the first trailer for the fourth season of ‘The Walking Dead’, which was unveiled at the Comic Con, which took place in San Diego between 18 and 21 July.

The fourth season premiere on October 13 at the AMC.

© AMC

  

Woman dies in India after acid attack perpetrated by lover - RTP

xmlns=”http://www.w3.org/1999/xhtml”>

Redirect Notice

The previous page is sending you to

http://www.rtp.pt/noticias/index.php?article=668357

.

If you not want to visit the que page, you can return to the previous page.

Sunday, July 21, 2013

New iPhone 5 images compared with supposed low-cost iPhone - Tecnologia.com.pt

iPhone 5 and low cost compared In the last few weeks have intensified rumors and images published in many international about upcoming Apple iPhones , one of which is speculated to be the low cost . The image of the hand is the most recently released, and was obtained by site Weibo.

Pictured are, side by side, the current model, the iPhone 5, and the expected iPhone low-cost . As mentioned before Apple was preparing two versions of the new iPhone , models with code names and Zagato Zenvo / Bertone. comparison iphones

Rumors point to small differences in settings of products. The Zenvo would H5P dual-core processor (manufactured by Samsung) and 1 GB of RAM. Already Zagato / Bertone, the same Giga memory, the processor include H6P. Differences also arrive to 4G connectivity, which indicates that the product should be launched in different markets.

Also note the differences in the physical characteristics of smartphones (evident in images) cheaply made plastic . In the photographs, the bottom plastic iPhone has four holes at one side, while the iPhone 5 has “grids” on both sides. The volume buttons are also different: the iPhone low-cost has buttons oval rather than circular.

Liked this article? Share it with your friends

Google Play hits 50 billion downloads - TeK.sapo

The store multimedia content and applications Google Play has recently hit the 50 billion downloads. The figure was revealed by the director general of the search engine giant, Larry Page, during the conference call with investors that followed the presentation of results.

The operating system Android Market reaches the goal two months later from the Apple App Store have reached the same mark. Both online stores are a very close fight in terms of numbers – of applications available and downloads made – but Google Play seems to take advantage.

The App Store hit that mark on May 16, almost a month before the market fulfill its fifth anniversary. Google Play hits 50 billion downloads three months before fulfilling also his fifth birthday, which happens in October.

On May 15 Google had announced 48 billion downloads, which gives an average of one billion apps, movies, series, magazines and songs downloaded per month.

Larry Page also revealed that developers are making more money than ever, having the Google paid both in the first half of 2013 and paid during the year 2012.

The numbers presented by Google should not slow down as early as the daily rate of active devices with the Android operating system is around 1.5 million units.

Written under the new Orthographic Agreement

Capcom announces reboot of "Strider" One for Xbox and PS4 - Tecnologia.com.pt

Strider Capcom announced in recent days the launch of a new game at Comic Con in San Diego (USA). It’s reboot of “Strider”, which should be available for the next generation consoles at the beginning of 2014.

According to the company, this sidescroller in a version that Capcom has described as a “2.5 D” is being developed by Double Helix studio responsible for the creation of other titles for the Xbox One

The game will come to the new console from Microsoft and the PlayStation 4 via the Steam store. However, the ancestors – Playstation 3 and Xbox 360 – not left out, as well as the PC.

The description reveals that the title “Half the year is: 048 and [ninja] Hiryu, a young but deadly hitman, has the mission to eliminate the Grandmaster Meio.”

Through a publication on its official blog, Capcom revealed that this “Strider” have a kind of “anti Cypher at high speed” , as well as several unique features Cypher that players will be able to discover along the action. For now, here is the trailer game.

http://youtu.be/0jMwcJI0pEg

Liked this article? Share it with your friends

DuckTales-remastered-170308 remastered version of the classic “Duck Tales” will come to the PS3, X360 and Wii U

Saturday, July 20, 2013

Microsoft shares suffer biggest drop since 2000 - TVI24

Microsoft shares fell more than 12 percent on Friday. The company recorded the biggest drop in 13 years, a day after it announced the quarterly results dececionantes. Concerned, the weak demand for the latest version of Windows operating system and Surface tablet sales that are lower than expected.

The drop occurs after the company reached new highs given the last five years. The current breakdown is the highest since April 2000, by which time the company was experiencing a dispute with the U.S. government and the Internet bubble was losing strength.

losses Friday represent about 36 billion drop in market value of the company. In one day, the fall was greater than the size of rival Yahoo.

Microsoft had a quarterly profit below expectations. Earlier this week, Microsoft said it was cutting prices drastically Surface to attract consumers, reducing the amount of equipment in the inventory.

Microsoft Surface tablet launched last year in defiance of the iPa d, Apple, but sales have not met expectations.

“The potential growth engines of Microsoft (Windows 8, Surface) seem to be losing strength as we enter fiscal year 2014,” said David Hilal of FBR Capital Markets, in a report, adding that Windows revenue last quarter was 9 percent below expectations.

Sony may launch NFC lenses, battery and sensor fit for ... - Tudocelular.com

According to some sources – who chose to remain anonymous, the site Sonyalpharumors.com published a story about the possibility that Sony could create a market of photo accessories for smartphones. The device would be a lens that would own a sensor, battery and connecting to other NFC devices.

SONY logo
Sony logo

The strange thing is that the accessory has so many ways to live alone, it makes no sense behind a smartphone. The site says that this lens will own a sensor, battery, NFC connection and even internal memory to capture the images. This set of lenses and internal parts will created by a lens manufacturer Carl Zeiss and the sensor will be used in the same camera RX100 II.

Having lenses that can be switched on smartphones is a very interesting feature, which can help the quality of some models that do not have a power so great picture. Nokia has created an accessory for the Lumia 1020, bringing an extra battery and a new way of pushing the photo button, which greatly improves the feel of holding a camera-phone . But anyway, this is still an accessory that does not live alone, it depends on the Lumia.

sensor itself, its own battery and internal memory up to a set of lenses, we have a camera ready, you do not need much of a smartphone along. Right? [Pocket-lint]

Tudocelular.com Writing

likes? Then share and follow us!